Try our new research platform with insights from 80,000+ expert users
reviewer2355684 - PeerSpot reviewer
Jefe De Infraestructura at a real estate/law firm with 201-500 employees
Real User
Top 10
Mar 26, 2024
Excels in providing robust protection against cyber threats while offering seamless management, scalability and responsive support
Pros and Cons
  • "It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from."
  • "There are occasions when it interfaces with other systems, leading to a loss of visibility."

What is our primary use case?

We implement it to protect applications and APIs across multi-cloud environments.

How has it helped my organization?

The primary advantage we experienced was in terms of security capabilities. Previously, our proxy solution lacked this level of protection, but with Check Point, we now benefit from streamlined management and complete visibility.

What is most valuable?

One of its most significant benefits is its ability to defend against a diverse array of security threats, without needing a specific configuration. It seamlessly protects through machine learning, giving us visibility into potential attacks and where they come from.

CloudGuard Application Security's ability to safeguard our applications from threats without depending on signatures is crucial. The intelligence behind its operation gives us the impression that it's being overseen by a human, evaluating whether activities are benign or malicious. It consistently provides accurate responses without requiring constant intervention from us.

In terms of its performance, CloudGuard Application Security boasts remarkably low rates of false positives. Occasionally, in certain implementations or configurations of additional functionalities, it may detect new elements as potentially intrusive, prompting proactive protection measures. However, meticulous programming and clear delineation of release parameters are necessary to address such instances effectively.

The solution has effectively lowered our overall cost of ownership for the web application firewall. Without the protective function of the firewall in place, issues are bound to increase. Therefore, it's crucial to configure it correctly to ensure that the internal intelligence can operate seamlessly with the application.

We opted not to utilize our cloud vendor's web application firewall since we have minimal cloud applications, primarily relying on those managed by CheckPoint. This decision is critical for securing our internal organization's work effectively.

What needs improvement?

We recently had a discussion about the challenge of API discovery and protection. There are occasions when it interfaces with other systems, leading to a loss of visibility. It would be advantageous to improve this aspect.

Buyer's Guide
Check Point CloudGuard WAF
December 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.

For how long have I used the solution?

We have been working with it for two years.

What do I think about the stability of the solution?

The stability is commendable. Since implementation, we experienced only one interruption due to an update, which was promptly resolved.

What do I think about the scalability of the solution?

The scalability is highly commendable, continually evolving in this aspect.

How are customer service and support?

The technical support provided was excellent. Whenever we encountered complex configurations, we could easily engage with them for clear guidance, and the assistance provided was satisfactory. They demonstrate high effectiveness, and their response time is prompt. I would rate it nine out of ten.

How would you rate customer service and support?

Positive

What about the implementation team?

The deployment model of CheckPoint relies on virtual machines, such as VMware, which are implemented within our internal infrastructure. The deployment process was quick, smooth, and intuitive, as it was transparent. For deployment, we engaged a reseller to facilitate communication between CheckPoint and our organization. Additionally, we utilized their administrative services for monitoring the implementation process.

What was our ROI?

In regard to ROI, I believe that its capacity to safeguard our organization's information is highly advantageous.

What's my experience with pricing, setup cost, and licensing?

Considering all the benefits we've observed, we find the price to be satisfactory. While licenses were slightly more expensive previously, with the addition of more clients, it has proven to be reasonable.

Which other solutions did I evaluate?

We assessed several SaaS options alongside Check Point, and the primary distinguishing factor was the level of protection guaranteed by Check Point. Additionally, its maturity as a solution adds another layer of reliability.

What other advice do I have?

Based on its effectiveness in safeguarding us from potential attacks and the value it has demonstrated, I would give it a perfect score of ten out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
It architect at a energy/utilities company with 1,001-5,000 employees
Real User
Top 10
Mar 4, 2024
Useful for blocking applications and IPs
Pros and Cons
  • "The tool helps us to block IPs and applications."
  • "I have faced issues with the tool's blocking aspects. It is hard to open or block web services due to the multitude of cloud centers. I have to do the process manually at times. We have a bug which is hard to solve."

What is our primary use case?

We use the product to access the internet internally. It helps us to block unnecessary networks. 

What is most valuable?

The tool helps us to block IPs and applications. 

What needs improvement?

I have faced issues with the tool's blocking aspects. It is hard to open or block web services due to the multitude of cloud centers. I have to do the process manually at times. We have a bug which is hard to solve. 

For how long have I used the solution?

I have been using Check Point CloudGuard Application Security for ten years. 

What do I think about the stability of the solution?

I like the tool's stability. 

What do I think about the scalability of the solution?

Check Point CloudGuard Application Security is scalable. 

How are customer service and support?

Check Point CloudGuard Application Security's support is sometimes good. 

Which solution did I use previously and why did I switch?

We had used Sophos before Check Point CloudGuard Application Security. We switched to the product since Sophos did not have a firewall then. 

How was the initial setup?

Check Point CloudGuard Application Security's deployment is not complicated. 

What about the implementation team?

The tool's control helped us with the deployment. 

What's my experience with pricing, setup cost, and licensing?

Check Point CloudGuard Application Security's pricing is not friendly. 

What other advice do I have?

False positives happen occasionally, but it's not a big deal for me. I prefer false positives over the risk of something going undetected. The tool's abilities for preemptively blocking zero-day attacks and detecting hidden anomalies are good. It has helped us reduce the TCO for the web application firewall. I rate it a nine out of ten.  

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Check Point CloudGuard WAF
December 2025
Learn what your peers think about Check Point CloudGuard WAF. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,422 professionals have used our research since 2012.
AshleyMorales - PeerSpot reviewer
Cloud computing at a cloud solution provider with 51-200 employees
Real User
Nov 20, 2023
Helps with compliance, mitigates security risk, and helps reduce costs
Pros and Cons
  • "With the solution, we managed to obtain complete comprehensive visibility of the entire environment in the cloud, thus having better control of each of the resources."
  • "They should improve in the delivery of more detailed reports with more information."

What is our primary use case?

Currently, we have our applications and devices in the Microsoft cloud in Azure. We have been modernizing our platform, and some services we have been converting to a platform as a service for which many app services have been implemented, among other workloads, and we needed to expose them to the outside. Therefore, a tool was needed that could do this security filtering and that also provided a set of native tools and functionalities for the cloud and checkpoint to meet the needs that we were presenting.

How has it helped my organization?

Since we were able to implement this new tool, we have been able to put into production all the applications that we have modernized for the use of our clients and officials, thus resulting in a more continuous and faster improvement of our services and achieving better scalability, stability and we have managed to reduce the costs and labor in IT, thus ensuring that our developers dedicate themselves to other projects and not be making patches for the applications as we were doing due to our obsolete technology, in addition, it provided us with regulatory compliance, monitoring, and analysis of all applications.

What is most valuable?

The tool has many valuable features that help us in our day-to-day life with all the applications. With the solution, we managed to obtain complete comprehensive visibility of the entire environment in the cloud, thus having better control of each of the resources.

In addition to that, we managed to have security policies that allow us to reward compliance in each of the applications. We've been able to provide better regulatory compliance, thus being able to mitigate security risks in our environment and achieve a better standard in the security of the company.

What needs improvement?

The tool is currently one of the best on the market. It has a series of more innovative features in the security market. That said, there are improvements necessary.

They should improve in the delivery of more detailed reports with more information. 

They should improve in the support they provide since they have lost a lot of strength here. Quality has dropped; they do not comply with the SLA. 

They should have a centralized library of each of the manual technologies, guides, and errors where everything can be found in one place so that we do not waste time searching all over the web for a solution or guide.

For how long have I used the solution?

This solution is new; I have been using it for one year,

What do I think about the stability of the solution?

To this day, the stability of the tool is very good and has not presented any problems.

What do I think about the scalability of the solution?

The scalability of the tool is very good; it is multi-cloud.

How are customer service and support?

The support must be improved. The performance and quality it offers have decreased.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

It is one of the first tools that implements application security.

How was the initial setup?

The installation was simple since we have experience with these tools, however, it does have a medium learning curve.

What about the implementation team?

The implementation was carried out by the IT department with the help and supervision of the vendor's engineer.

What was our ROI?

The investment was quite relevant; we did it to protect our information and power the applications in production.

What's my experience with pricing, setup cost, and licensing?

The price and licenses are very competitive in the market and should go down a little.

Which other solutions did I evaluate?

We did look into Microsoft tools, such as the WAF, which were evaluated. They did not meet the organization's needs.

What other advice do I have?

It is an excellent multicloud tool with good security features.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Nagendra Nekkala - PeerSpot reviewer
Senior Manager ICT & Innovations at a logistics company with 501-1,000 employees
Real User
Top 10
Nov 7, 2023
Performs health checkups but needs to improve integration
Pros and Cons
  • "The tool performs device health checkups and updates us. It helps us to be compliant with regulatory policies."
  • "Check Point CloudGuard Application Security needs to improve updates on integrations. It also needs to incorporate real-time monitoring features."

What is our primary use case?

Check Point CloudGuard Application Security helps us ensure the security of contact devices and meet audit requirements for compliance. 

What is most valuable?

The tool performs device health checkups and updates us. It helps us to be compliant with regulatory policies. 

What needs improvement?

Check Point CloudGuard Application Security needs to improve updates on integrations. It also needs to incorporate real-time monitoring features. 

For how long have I used the solution?

I have been using the product for two years. 

What do I think about the stability of the solution?

We encountered stability issues during the configuration. The tool's stability is good. 

What do I think about the scalability of the solution?

Check Point CloudGuard Application Security is scalable. My company has 1000 users for it. 

How are customer service and support?

The tool's support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

Check Point CloudGuard Application Security's deployment is easy and completed in six hours. You need two to three resources to handle the deployment. You need proper training to do it. 

What's my experience with pricing, setup cost, and licensing?

The tool's licensing costs are yearly and competitive. 

What other advice do I have?

I rate Check Point CloudGuard Application Security an eight out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Edwin Solano Salmeron - PeerSpot reviewer
Soporte técnico superior at a financial services firm with 51-200 employees
Real User
Feb 19, 2023
Help s guarantee that applications are secure, protected, and resistant to attacks
Pros and Cons
  • "The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps."
  • "Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools."

What is our primary use case?

As one of the solutions that we need for protection at the API level, we have found the level of attack detection needed to comply with the internal regulations of the corporation.

It protects both financials and identity searches. It is a new generation of security that can help us seek, implement, and select different brands products for enhanced protection. This is important due to the acceleration and development of many applications. It helps us reduce the risk of vulnerability in productive applications. 

How has it helped my organization?

The use of CloudGuard Application Security protects the page and online web services against SQL injection attacks. This prevents attackers from accessing our databases and stealing financial information from customers. These services help identify and fix vulnerabilities in our application and allow us to identify when there is a vulnerability, such as a code injection, and click on the site to see recommendations in order to fix issues before attackers can exploit weaknesses.

What is most valuable?

The solution offers sophisticated security techniques with unique characteristics that can be particularly valuable for the financial sector, which is where we develop apps. It helps us to guarantee that financial applications are secure, protected, and resistant to attacks, which is essential to maintain trust and reputational power with any client that is subscribed to our services.

What needs improvement?

Deeper and more transparent integration between Cloud Application Security and analysis monitoring tools could be very valuable - although the solution currently offers integrations with third-party security tools. Still, a deeper integration could provide better visibility of all the threats. It would be ideal if they could be found in real-time, allowing our financial or security team to offer a more effective response to attacks. 

For how long have I used the solution?

I've used the solution for two years.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Hugo Alexis Espinoza Naranjo - PeerSpot reviewer
Perimeter Security Administrator at a security firm with 51-200 employees
Real User
Top 20
Feb 15, 2023
Easily deployed with good visibility and excellent security capabilities
Pros and Cons
  • "By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency."
  • "A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection."

What is our primary use case?

We were looking for a solution that met the following criteria: 

  • A web application security solution that uses real-time attack prevention techniques and vulnerability scanning to protect applications and data running in public or private cloud environments. 
  • Monitoring and logging of application traffic to detect anomalies and suspicious attacks.
  • Integration with automation and orchestration tools for cloud application security management and scalability. 
  • Detection and prevention of SQL injection attacks, cross-site scripting (XSS), and other types of injection attacks. 

How has it helped my organization?

The product benefits my business by giving enhanced protection for useful cloud applications. 

Using enhanced visibility and analytics, the product provides visibility into security. By using a cloud application security solution, our company can save costs by reducing the need for additional security hardware and software and improving operational efficiency. 

With this product, we are achieving regulatory compliance. CloudGuard Application Security can help businesses meet security regulatory requirements, which makes for an outstanding organization. 

What is most valuable?

This cloud web application security solution can be quickly and easily deployed in public or private cloud environments, allowing a company to protect web applications and reduce downtime quickly. 

This solution provides us with enhanced visibility, giving us the ability to provide web application security analysis in the cloud.

What needs improvement?

A feature we'd like to see in the future is something that could protect against other attack vectors, with a focus on application protection. We need to protect against other attack vectors like network or device email attacks in order to provide the greatest protection possible. It is very understandable that there are many characteristics of an attack, including if it is from the inside or outside the organization. However, it would be important to validate threats and have all manner of solutions on hand to help protect the company.  

For how long have I used the solution?

I've used the solution for one year.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2037513 - PeerSpot reviewer
Project Manager at a marketing services firm with 501-1,000 employees
User
Jan 22, 2023
Great support, excellent ROI, and good performance
Pros and Cons
  • "It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future."
  • "The coding configurations can be simplified to save time for IT teams and developers."

What is our primary use case?

This solution safeguards applications that are hosted in the organization's cloud servers. 

It monitors the performance of applications from the deployment stage to the implementation of assigned tasks. 

Check Point CloudGuard Application Security blocks any cyber attacks channeled to destroy confidential data. 

Configuration of this platform with other tools took place efficiently without any challenge. The set security features alert the IT team when there are external threats that can affect workflows. the organization's networking infrastructure is ever secure since we deployed this product.

How has it helped my organization?

The solution has comprehensive security cover for the cloud applications, which has been a great achievement in the organization since we deployed this platform. 

It provides advanced analytics that gives each team time to prepare for any threat that might occur in the future. 

Enhanced data intelligence helps us to plan and turn provides analytics into actionable insights. 

Safeguarding applications has enabled members to focus on more productive activities without fear of being attacked. The set of security tools enables each app to perform its role without external interference.

What is most valuable?

Sensitive data exposure has enabled us to plan and make reliable decisions based on the work environment. 

The product has confirmed to each department that the injection of new data into the systems is highly secured to enhance transparency. 

Security misconfigurations enable the IT team to rearrange application codes and take full control. 

Insecure deserialization provides a comprehensive report of applications that enables the IT team to identify malicious coding and execute it in advance before it affects workflows.

What needs improvement?

The coding configurations can be simplified to save time for IT teams and developers. 

Insufficient logging among applications breaches security, and this may lead to undetected malware attacks contributing to data compromise. 

The set security tools target known vulnerabilities, and when there is an outbreak of new viruses, it may not be noticed, easily exposing data to cyber attackers. 

Broken access control enables members to gain unauthorized access to saved files allowing them to edit accounts to enable other users to gain access. The software has great capability of preventing data with the set organization policies.

For how long have I used the solution?

I've used the solution for nine months.

What do I think about the stability of the solution?

This platform is stable, and the performance is excellent.

What do I think about the scalability of the solution?

I am impressed by the scalability.

How are customer service and support?

There is great support and cooperation from the customer service team.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have not worked with a similar solution.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

The vendor team was responsible for the full deployment.

What was our ROI?

There is increased ROI from improved application security.

What's my experience with pricing, setup cost, and licensing?

The cost and setup are good, depending on the company size.

Which other solutions did I evaluate?

I have no experience with other security products on the market.

What other advice do I have?

This platform is good for safeguarding cloud applications.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Assistant Manager at a consultancy with 51-200 employees
User
Sep 11, 2022
Has advanced security features, offers free trials, and is easy to deploy
Pros and Cons
  • "They offer free trials, which is quite appreciative and grabs more attention from new users and businesses."
  • "I advise proactive threat detection intelligence offline, which can also help monitor and ensure system checks and compliances are in place."

What is our primary use case?

Check Point CloudGuard Application Security is the one-stop solution for the security of applications and providing API protection to servers and facilities 24/7. 

The security of API integrations is the need of the hour for all kinds of businesses. All the workloads and cloud servers are singularly managed through a unified security mechanism, which ensures round-the-clock protection of applications and servers from endpoints and malware threats.

For our organization, it plays a critical role in easy deployment and API integration with all kinds of cloud servers and platforms of external stakeholders.

How has it helped my organization?

It has provided 24/7 security to our servers on-premise and works remotely for our remote workforce and workloads. 

It offers all-around protection from malware attacks and endpoints and has helped us to bring more compliance in the organization and also ensure that no slips ups happened on aspects of security for servers and cloud systems integrated pan country with different external stakeholders system. 

It helps to bring confidence in clients, and there is better retention of business for a longer period of time.

Also, it helps us to streamline our revenue streams, and comparatively, we are burning less money on application security now. 

What is most valuable?

The best features for ensuring application and cloud servers security are:

1. High-grade and extremely advanced security features like Intrusion Prevention System (IPS) for restricting entry of potential ransomware into the system and server.

2. They offer free trials, which is quite appreciative and grabs more attention from new users and businesses.

3. Security enhancement of systems and servers through "bot prevention" is amazing and worth using to ensure end-to-end security of applications.

4. The easy deployment and flexible customizations as per user and market requirements are worth adding to our systems.

What needs improvement?

I advise proactive threat detection intelligence offline, which can also help monitor and ensure system checks and compliances are in place. At present, we require a lot of customization and additional features to make it usable in our system.

The additional customization features are costing us huge, which is why we are a bit hesitant in doing fast, rapid customizations as it's quite dynamic, and features might change in the next six months due to the huge level of tech advancement in the cloud application security environment.

The cost should be minimal so that every business can use the offerings without any hesitation, and it does not become a burden for anyone.

For how long have I used the solution?

I've spent almost nine months with this software.

What do I think about the stability of the solution?

The solution offers stable services.

What do I think about the scalability of the solution?

It is highly scalable across different work environments.

Which solution did I use previously and why did I switch?

An internal security solution was being used previously and it was locally managed by a third party.

How was the initial setup?

The solution is straightforward to set up and easygoing throughout.

What about the implementation team?

We implemented through vendor services only as that's the only permissible mode for our organization as per our internal compliance and approved processes.

What was our ROI?

We've seen an ROI of close to 90%.

What's my experience with pricing, setup cost, and licensing?

I would strongly recommend all IT workforce and IT organizations try Check Point Cloud Guard Application Security. It is one of the best solution providers and is highly dependable and credible in terms of the way they operate and its professional commitment. It's amazing to work with them as they never disappoint you and you will have the best customer experience ever.

Which other solutions did I evaluate?

We evaluated quite a lot of options. We looked into Qualys Cloud Platform, Trend Micro Security, Onapsis, etc. 

What other advice do I have?

Try their solution and experience the utilities and service offerings yourself. This will give you first-hand exposure and experience and will result in longer customer satisfaction.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Check Point CloudGuard WAF Report and get advice and tips from experienced pros sharing their opinions.